Analysis
-
max time kernel
119s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
11-01-2025 06:43
Behavioral task
behavioral1
Sample
JaffaCakes118_f9d87b9d6bc1aa9df91937f72b93a5c9.pdf
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_f9d87b9d6bc1aa9df91937f72b93a5c9.pdf
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_f9d87b9d6bc1aa9df91937f72b93a5c9.pdf
-
Size
72KB
-
MD5
f9d87b9d6bc1aa9df91937f72b93a5c9
-
SHA1
e469d0148c33bf5b4e5a4931e29acb5ef32d5c1a
-
SHA256
60c31568c7cabff269ca24b8b842f82ad10f2a126272094066aa79426d3ad43a
-
SHA512
e9e68b61a5119464b120a2e88ea3270592a1dacf77c7a027a2d75820f03b24ad1d336a3cbf23c50a6ad107d709cc26ab6c99d67e6d9cf88c7b7843e6b150a9fe
-
SSDEEP
1536:B73rr+mG14Ty6H5KqhXmgMhnEIEA5W4wfFIjH0cF+cWcpOmF96J6K:N3rFpeafBMhEIwIj1onmF8JH
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2356 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2356 AcroRd32.exe 2356 AcroRd32.exe 2356 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_f9d87b9d6bc1aa9df91937f72b93a5c9.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2356
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD54383288ea719788fca976af9b57446c2
SHA1ff0eb91c35c2fb14ab4a72134602114f5d744508
SHA256ea60c75d089ecb6fba70752931276c430e9899ae0c15dc71e21f324490934897
SHA512cc46f8420c95396da7e4c761203e2ec32e13c6eb0176e473ca66b2e348d515500e3907c7707a171fa521508506631f3ca5cb8b35cfb6871b795c4185bad74180